An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Oct. 17, 2014

Using the Discrete Event System Specification to model Quantum Key Distribution system components

By Sgt. Maj. Jeffrey Morris, Michael Grimaila, Douglas Hodson, Colin McLaughlin, David Jacques

In this paper, we present modeling a Quantum Key Distribution (QKD) system with its components using the Discrete Event System Specification (DEVS) formalism. The DEVS formalism assures the developed component models are composable and exhibit well-defined temporal behavior independent of the simulation environment. These attributes enable users to assemble a valid simulation using any collection of compatible components to represent complete QKD system architectures. To illustrate the approach, we introduce a prototypical ‘‘prepare and measure’’ QKD system, decompose one of its subsystems, and present the detailed modeling of the subsystem using the DEVS formalism. The developed models are provably composable and exhibit behavior suitable for the intended analytic purpose, thus improving the validity of the simulation. Finally, we examine issues identified during the verification of the conceptual DEVS model and discuss the impact of these findings on implementing a hybrid QKD simulation framework.

 

READ MORE

 

PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023